Skip to main content
Log in

On the Use of Hash Functions as Preprocessing Algorithms to Detect Defects on Repeating Definite Textures

  • Original Paper
  • Published:
Machine Vision and Applications Aims and scope Submit manuscript

Abstract

Hash functions are one way functions and often used in cryptography to ensure the integrity of files by creating a binary signature specific to that file. In a similar way, a family of special hash functions can be developed and used to generate one dimensional signatures of an image. The resultant signatures can then be used to compare the image either to a golden template or, if the image consists of repeating definite patterns, then to the texture itself. While such hash functions are sensitive enough to detect small changes and defects in repeating texture, they are immune to changes in illumination and contrast. In this paper we discuss the generation of suitable hash functions for textured images, which are simple enough to fit into a very small FPGA, and provide several examples of their use.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Chin R.T., Harlow C.A. (1982). Automated visual Inspection: a survey. IEEE Trans. Pat Rec. PAMI-4(6):557

    Article  Google Scholar 

  2. Thomas, A.D.H., Rodd, M.G. Holt, J.D., Neill, JC.J.: Real-time industrial visual inspection: a review, Real-Time Imaging. Academic, New York 139–158 (1995)

  3. Onishi, H., Sasa, Y., Nagai, K., Tatsumi, S.: A pattern defect inspection method by parallel grayscale image comparison without precise image alignment. IECON 02 3, 2208–2213 (2002)

    Google Scholar 

  4. Hiroi, T., Maeda, S., Kubota, H., Watanabe, K., Nakagawa, Y.: Precise visual inspection for LSI wafer patterns using subpixel image alignment. Applications of Computer Vision. In: Proceedings of the second IEEE workshop on, 5–7 Dec. 1994 pp. 26–34 (1994)

  5. Guan, S-U., Xie, P.: A golden block self-generating scheme for continuous patterned wafer inspections. Image analysis and processing. In: Proceedings of international conference on, 27–29 Sept. 1999 pp. 436–441 (1999)

  6. Chen, J., Jain, A.K.: A structural approach to identify defects in textured images. In: Proceedings of IEEE., international conference Systems, Man and Cybernetics, 8–12 August, China, pp. 29–32 (1988)

  7. Hajimowlana, S.H., Muscedere, R., Jullien, G.A., Roberts, J.W.: 1D autoregressive modeling for defect detection in web inspection systems. Circuits and Systems. In: Proceedings of 1998 Midwest Symposium on, 9–12 Aug. 1998, pp. 318–321 (1998)

  8. Hajimowlana H., Muscedere R., Jullien G.A., Roberts J.W. (2000). Defect detection in web Inspection using fuzzy fusion of texture features. ISCAS 3:718–721

    Google Scholar 

  9. Koshimizu H. (1979). Fundemental study on automatic fabric inspection by computer image processing. SPIE Imag. Appl. Aut. Ind. Ins. Ass. 182:30–37

    Google Scholar 

  10. Fang T., Jafari M.A., Danforth S.C., Safari A. (2003). Signature analysis and defect detection in layered manufacturing of ceramic sensors and actuators. Mach. Vis. App. 15: 63–75

    Article  Google Scholar 

  11. Venkatachalam V. (2000). Image classification using pseudo power signatures. IEEE Int. Conf. Image Process. 1:796–799

    Google Scholar 

  12. Schneier B. (1996). Applied crytography, 2nd edn. Wiley, New york

    Google Scholar 

  13. Menezes A.J., van Oorschot P.C., Vanstone S.A. (1996). Handbook of Applied Cryptography. CRC Press, Boca Raton

    Google Scholar 

  14. Baykal, I.C., Muscedere, R., Jullien, G.A. On the use of hash functions for defect detection in textures for in-camera web inspection systems. Circuits and Systems. ISCAS In: IEEE Int. symp. 5 pp. V-665 – V-668 (2002)

  15. Walsh J.L. (1923). A closed set of orthogonal functions. Am. J. Math. 45:5–24

    Article  MATH  Google Scholar 

  16. Fine N.J. (1949). On the Walsh functions. Trans. Am. Math. Soc. 65:372–414

    Article  MATH  MathSciNet  Google Scholar 

  17. Liu Y., Collins R.T., Tsin Y. (2004). A computational model for periodic pattern perception based on frieze and wallpaper groups. IEEE Trans. PAMI 26(3):354–371

    Google Scholar 

  18. Baykal, I.C., Jullien, G.A.: Detection of defects in textures with alignment error for real-time line-scan web inspection systems. Circuits and Systems, 2002. MWSCAS-2002. In: The 2002 45th Midwest Symposium on, vol. 3, 4–7 Aug. 2002 pp. III-292 – III-295 (2002)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ibrahim Cem Baykal.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Baykal, I.C., Jullien, G.A. On the Use of Hash Functions as Preprocessing Algorithms to Detect Defects on Repeating Definite Textures. Machine Vision and Applications 17, 185–195 (2006). https://doi.org/10.1007/s00138-006-0028-0

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00138-006-0028-0

Keywords

Navigation